Back to dashboard Read module

Quiz reading view

Quiz 1E — Enforcement Agencies and Mechanisms

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Enforcement Agencies and Mechanisms as learned.

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Enforcement Agencies and Mechanisms as learned.

Type Quiz
Updated 2026-04-12
Reading time 5 min read
Questions 10

Check the reading before you move on.

01e-enforcement-agencies.md | Last updated: 2026-04-12

**DISCLAIMER:** Educational purposes only. Not legal advice.

Question 1

A company that suffered a ransomware attack wants to report it to federal authorities. Which agency and portal should they use to submit an initial internet crime complaint?

Question 2

What is the primary role of DOJ's Computer Crime and Intellectual Property Section (CCIPS)?

Question 3

A company's CISO wants to report a ransomware attack to a federal agency to get defensive support and threat intelligence sharing WITHOUT necessarily triggering a criminal investigation. Which agency is most directly positioned for this role?

Question 4

Before approving a ransomware payment, legal counsel must conduct screening against which government list to avoid civil liability for sanctions violations?

Question 5

Which of the following best describes the FinCEN reporting obligation triggered by a ransomware payment?

Question 6

A federal prosecutor needs subscriber information and server logs from an internet company in Germany for a U.S. cybercrime case. What is the formal evidence-sharing mechanism — and what is its primary limitation?

Question 7

Federal cybercrime sentences often combine multiple charges. Which charge adds a MANDATORY 2-year consecutive prison term that cannot be suspended or run concurrently?

Question 8

The government seized a portion of the Colonial Pipeline ransom payment. What legal mechanism enables law enforcement to seize cryptocurrency connected to cybercrime?

Question 9

The NSA's Vulnerabilities Equities Process (VEP) governs what decision?

Question 10

A company that notified consumers of a breach two months after discovery (without any law enforcement delay request) is facing California AG investigation. A consumer class action was also filed the same week as public notification. What is the most accurate description of the company's legal exposure?